Checkmarx / red-liliLinks
This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided here is intended for research purposes.
☆11Updated 2 years ago
Alternatives and similar repositories for red-lili
Users that are interested in red-lili are comparing it to the libraries listed below
Sorting:
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 3 years ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Monorepo of Labs for the Security Knowledge Framework (SKF)☆37Updated 3 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆151Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆187Updated last year
- Monthly CVE Stats☆43Updated 3 weeks ago
- Dependency Combobulator☆93Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 7 months ago
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- ☆44Updated 4 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- AI featured threat modeling and security review project☆16Updated 10 months ago
- Damn Vulnerable Java (EE) Application☆141Updated last year
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆36Updated 2 weeks ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆81Updated 2 years ago
- Damn Vulnerable Python Web App☆177Updated last year
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Updated 5 years ago
- AWS Security Checks☆40Updated 7 years ago
- A list of queries and actions that I repeat over and over again☆64Updated 5 years ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆62Updated 3 months ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆21Updated 2 years ago
- a shared short domain for XSS and other hacks☆32Updated 3 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆49Updated 2 months ago
- Python wrapper for the API of cve-search☆126Updated last year